1 |
DARPA BAA 07 - 24 - solicitations-microsystems technology office [Internet]. Available : http://www.darpa.mil/mto/solicitations/baa07-24/index.html
|
2 |
M Tehranipoor, H Salmani X. Zhang, Integrated Circuit Authentication, Springer publishers, 2014.
|
3 |
Bhunia et al.: "Hardware Trojan Attacks: Threat Analysis and Countermeasures," in Proceedings of the IEEE, vol 102, no.8, pp 1229-1247, Aug. 2014.
DOI
|
4 |
M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," in the IEEE Design & Test of Computers, vol.27, no.1, pp. 10-25, Feb. 2010.
|
5 |
S. Adee, "The hunt for the kill switch," Spectr. IEEE 45 (5) May (2008) 34-39
|
6 |
Y. Alkabani and F. Koushanfar, "Consistency-based characterization for IC Trojan detection," in Proceedings of International Conference on Computer-Aided Design, pp. 123-127, Nov. 2009.
|
7 |
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi and B. Sunar, "Trojan Detection using IC Fingerprinting," in Proceedings of the Symposium on Security and Privacy, pp. 296-310, May 2007.
|
8 |
Y. Jin and Y. Makris, "Hardware Trojan Detection using Path Delay Fingerprint," in Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp. 51-57, Jun. 2008.
|
9 |
L.W. Kim and J. D. Villasenor, "A System -On-Chip Bus Architecture for Thwarting Integrated Circuit Trojan Horses" IEEE transaction on VLSI, Oct. 2011.
|